Sciweavers

5577 search results - page 948 / 1116
» E2K Technology and Implementation
Sort
View
COMPUTER
2004
162views more  COMPUTER 2004»
15 years 4 months ago
Context-Aware Trails
The growth of ubiquitous computing has given rise to a range of possibilities for context-based application development. Technologies for mobile computing and context-awareness can...
Siobhán Clarke, Cormac Driver
CSI
2004
186views more  CSI 2004»
15 years 4 months ago
Towards a BioAPI compliant face verification system
Standards are important to the growth and acceptance of emerging industries such as the biometric industry. To promote biometric standard, the BioAPI Consortium has developed a wi...
X. Yuan, Siu Cheung Hui, Maylor K. H. Leung, Yongs...
CLUSTER
2002
IEEE
15 years 4 months ago
ZENTURIO: An Experiment Management System for Cluster and Grid Computing
The need to conduct and manage large sets of experiments for scientific applications dramatically increased over the last decade. However, there is still very little tool support ...
Radu Prodan, Thomas Fahringer
WWW
2003
ACM
16 years 5 months ago
Super-peer-based routing and clustering strategies for RDF-based peer-to-peer networks
RDF-based P2P networks have a number of advantages compared with simpler P2P networks such as Napster, Gnutella or with approaches based on distributed indices such as CAN and CHO...
Alexander Löser, Christoph Schmitz, Ingo Brun...
SIGUCCS
2003
ACM
15 years 10 months ago
WebDAV: what it is, what it does, why you need it
Legacy network file services such as NFS, SMB/CIFS, and AFP changed the way we worked. File services running on crossplatform networks allowed us to save our files on remote syste...
Luis O. Hernández, Mahmoud Pegah